GURPS Shadowrun 4th Edition

Techniques

These are all new techniques designed specifically for the Shadowrun world. For more details on techniques and how they work, GURPS 229.

Analyze

AverageDefaults: Computer Programing-2
Prerequisites: Computer Programming; cannot exceed prerequisite skill+4.
This is a program that watches data in the Matrix and is used to gather information available. Users, programs running, system resources, pregistery look-ups, etc. It’s also used as a Matrix Perception Check in the Matrix. This can also be used to expose a Spoof program in a contest. This is an ongoing program. See S226.

Armor

AverageDefaults: Computer Programing-4
Prerequisites: Computer Programming; cannot exceed prerequisite skill+2.
This is a program. This program is a series of Software redundancies that protect icons from attacks in the Matrix. The margin of success provides an ablative DR equal to your success. Activating an Armor program may be used as an Active Defense and will remain active until it’s depleted or the user logs out. This is an ongoing program.

Attack

HardDefaults: Computer Programing-5,
Prerequisites: 2 points in Computer Programming; cannot exceed prerequisite skill.
This is a program of hostile code carriers that attempt to kill processes, random inpt overflow buffers, etc. in an attempt to crash programs and icons. Margin of success inflicts HP damage to a program or icon.

Biofeedback Filters

AverageDefaults: Computer Programing-5
Prerequisites: Computer Programming; cannot exceed prerequisite skill.
This is a defensive program used against an Attack, Black Hammer, & Blackout. This is a contest of skills Vs. the opposing program. On a success damage is reduced to 0. Activating this program counts as an Active Defense. This is an ongoing program.
Biofeedback can be used against any damage received in the Matrix.

Black Hammer

HardDefaults: Computer Programing-7
Prerequisites: 4 points in Computer Programming; cannot exceed prerequisite skill-2.
This program does real damage to hotsim and fatigue to coldsim. Damage is determined by margin of success. Each point of success inflicts 1 point of real damage or 2 points of fatigue. Success 5+ means fright check with +1 per 1 beyond 5 and potential stunning. Use the rules for Major Wounds (G420). This is not an ongoing program.

Blackout

HardDefaults: Computer Programing-6
Prerequisites: 2 points in Computer Programming; cannot exceed prerequisite skill-1.
This is a nonlethal program. It inflicts fatigue damage for each point of success. . Use the rules for Major Wounds (G420) for any fatigue reduction beyond 1/3 Fatigue Points.

Browse

AverageDefaults: Computer Programing-1
Prerequisites: Computer Programming; cannot exceed prerequisite skill+5.
This program gathers information in the Matrix. These are specialized search routines used to track down information. This is an ongoing program. This can substitute a Research roll.

Command

AverageDefaults: Computer Programing-3
Prerequisites: Computer Programming; cannot exceed prerequisite skill+3.
This program is used to automate control over a device through the Matrix. For active control, use Electronics Operation. This is an ongoing program.

Data Bomb

AverageDefaults: Computer Programing-4
Prerequisites: Computer Programming; cannot exceed prerequisite skill +2.
This is a specialized reactive program that will attempt to crash the activating icon when triggered by running embedded programs. They can trigger Black Hammer, Blackout, Attacks, delete files, and corrupt files. Each added Program adds a -1 modifier. More than one Data Bomb may be attached or embedded into a file or device but all Data Bombs become easier to detect. There is a +1 to any dedection rolls per Data Bomb beyond the intial one.
Data Bombs may be detected with a Matrix Perception check (see Analyze 00). Only a succesful Disarm Data Bomb can disable a Data Bomb (Decrypt cannot be used). Activated programs happen simultanously.

ECCM

AverageDefaults: Computer Programing-4
Prerequisites: Computer Programming; cannot exceed prerequisite skill+2.
This program (Electronic Counter-Counter Measures) is designed to filter out jamming signals. This is a contest of skills of ECCM Vs. Electronics Operation (Electronic Warfare).

Encrypt

AverageDefaults: Computer Programing-4
Prerequisites: Computer Programming, Cryptography; cannot exceed prerequisite skill+2.
This program is designed to encrypt to secure files, access nodes, and communications between nodes. Margin of success should always be noted since any attempt to Decrypt it needs to beat this margin. This is not an ongoing program.

Exploit

HardDefaults: Computer Programing-4
Prerequisites: Computer Programming; cannot exceed prerequisite skill.
This program takes advantage of security flaws & weaknesses to gain unauthorized access. This is an contested roll Vs. the system’s Computer Programming skill. The margin of success provides a +1 to all programs while in the node.

Reality Filter

AverageDefaults: Computer Programing-3
Prerequisites: Computer Programming; cannot exceed prerequisite skill+3.
This program changes the node’s VR simsense sculpting to a metaphor of your choice. You receive a +1 to all checks in node on a success. On a failure the user suffers a -1 to all checks in the node. This is an ongoing program.

Spoof

AverageDefaults: Computer Programing-4
Prerequisites: Computer Programming; cannot exceed prerequisite skill+2.
This program is used to generate false access ID’s, forge misleading data packets, etc. to fool & mislead other programs. Note the margin of success. The inspecting program needs to beat this margin to detect the forgery. To dedect a spoof use Spoof or Analyze.

Stealth

HardDefaults: Computer Programing-5
Prerequisites: Computer Programming; cannot exceed prerequisite skill.
This program is ultilized to “stealth” through a node by making his data activity hidden, removing his trail, cloaking his data to look like an authorized user, or just making it hard to find. This is a contest of skills of Stealth Vs. Analyze and/or Track. This is an ongoing program.

Track

AverageDefaults: Computer Programing-4
Prerequisites: Computer Programming; cannot exceed prerequisite skill+2.
this Program is used to track a user’s connection or a trail of packets back to the originating node and user. This is a contest of skills Vs. Stealth.